Sciweavers

1888 search results - page 110 / 378
» Proof theory and computational analysis
Sort
View
95
Voted
BC
2005
122views more  BC 2005»
15 years 14 days ago
On partial contraction analysis for coupled nonlinear oscillators
We describe a simple but general method to analyze networks of coupled identical nonlinear oscillators, and study applications to fast synchronization, locomotion, and schooling. ...
Wei Wang 0008, Jean-Jacques E. Slotine
ICNC
2005
Springer
15 years 6 months ago
Credit Rating Analysis with AFS Fuzzy Logic
In this paper, we propose a new machine learning approach based on AFS (Axiomatic Fuzzy Sets) fuzzy logic, in attempt to provide a better model with interpretability. First, we wil...
Xiaodong Liu, Wanquan Liu
78
Voted
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 1 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
134
Voted
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 3 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
98
Voted
CIKM
2009
Springer
15 years 7 months ago
An analysis of information diffusion in the blog world
In the blog world, bloggers produce information, establish relationships with other bloggers in order to exchange information, and form a blog network, an online social network. I...
Yong-Suk Kwon, Sang-Wook Kim, Sunju Park